Sciweavers

6102 search results - page 1209 / 1221
» Generating Optimizing Specializers
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
CORR
2007
Springer
105views Education» more  CORR 2007»
13 years 7 months ago
Design and Modeling of a Mems-Based Valveless Pump Driven by an Electromagnetic Force
A novel valveless micro impedance pump is proposed and analyzed in this study. The pump is constructed of a upper glass plate, two glass tubes, a PDMS (polydimethylsilxane) diaphr...
Hsien-Tsung Chang, Chia-Yen Lee, Chih-Yung Wen
JSAC
2008
94views more  JSAC 2008»
13 years 7 months ago
An overview of limited feedback in wireless communication systems
Abstract--It is now well known that employing channel adaptive signaling in wireless communication systems can yield large improvements in almost any performance metric. Unfortunat...
David James Love, Robert W. Heath Jr., Vincent K. ...
JCP
2006
117views more  JCP 2006»
13 years 7 months ago
Empirical Analysis of Attribute-Aware Recommender System Algorithms Using Synthetic Data
As the amount of online shoppers grows rapidly, the need of recommender systems for e-commerce sites are demanding, especially when the number of users and products being offered o...
Karen H. L. Tso, Lars Schmidt-Thieme
ECR
2007
116views more  ECR 2007»
13 years 7 months ago
Enabling assisted strategic negotiations in actual-world procurement scenarios
In the everyday business world, the sourcing process of multiple goods and services usually involves complex negotiations (via telephone, fax, etc) that include discussion of prod...
Jesús Cerquides, Maite López-S&aacut...
« Prev « First page 1209 / 1221 Last » Next »